Previous Table of Contents Index Next
Perforce 2010.2: System Administrator's Guide



A
access level
and protections 88
access levels 89
access logging 23, 63
Active Directory 41, 130
admin access level 39, 90
administrator
force flag 52
privilege required 155
administrators
and job specifications 101
allocating disk space 20
AppleSingle 30
.asp files 50
audit log file
specifying 200
auditing 23, 63
authentication 39
security level 41
with triggers 130
automated checkpoints 27
automating Perforce 44
.avi files 50
B
backing up 31
backup
procedures 31
recovery procedures 33
backups
and Perforce Proxy 162
.bmp files 50
branches
namespace 67
broker 189
configuration file 191
installing 189
redirecting commands 197
running in background 191
running single-threaded 191
using with replica servers 196
.btr files 50
buffering
of input/output in scripts 140
C
can 154
case-sensitivity
and cross-platform development 23
UNIX and Windows 23, 58
centralized authentication server 197
centralized authorization server 83
centralized changelist server 85
change review 137
changelist numbers
highest possible 139
pending vs. submitted changelists 140
changelist submission triggers 114
changelist triggers 120
changelists
deleting 48
editing 48
multiserver environments 85
checkpoint
as part of backup script 31
creating 26
creation of, automating 27
defined 26
ensuring completion of 32
failed 27
introduced 25
managing disk space 20
when to call support 27
checkpoints
creating with p4 admin 27, 31
client
and port 15
clients
namespace 67
.cnf files 50
commands
forcing 52
concurrent development 52
content
trigger type 121, 122
counter
limits 139
CPU
and performance 143
CR/LF conversion 65
creating checkpoints 26
creating users 44
creation of users
preventing 44
cross-platform development
and case sensitivity 23
.css files 50
D
daemon
change review 137
daemons 111
changelist numbers 140
creating 138
database files 63
defined 25
where stored 25
db.* files 25
defect tracking
integrating with Perforce 109
deleting
changelists 48
depots 69
files, permanently 47
user groups 94
deleting users 45
depot
and Mac file formats 30
and server root 67
depot files
see versioned files 30
depots
defined 25
defining 66
deleting 69
listing 69
local 67
mapping field 72
multiple 66
namespace 67
remote 66, 73
remote, defining 72
disabling journaling 30
disk
performance 141
sizing 142
disk space
allocating 20
and server trace flags 61
estimating with p4 sizes 143
freeing up 47
distributed development 70
DNS
and performance 144, 145
.doc files 50
.dot files 50
drives
and db.*and journal file 19
E
editing
changelists 48
editor
Wordpad, limitation 158
environment variables
P4PCACHE 160, 162
P4PORT 160
P4TARGET 160, 162
error logging 23
error messages
and p4 verify 48
example
specifying journal files 29
exclusionary mappings
and protections 92
exclusive locking 52
.exp files 50
F
fields
of job template 102
file formats
AppleSingle 30
file names
mapping to file types 49
file specification
and protections 88
file types 50
mapping to file names 49
files
access to, limiting 92
.asp 50
.avi 50
.bmp 50
.btr 50
.cnf 50
.css 50
database 25
.doc 50
.dot 50
.exp 50
.gif 50
.gz 50
.htm 50
.html 50
.ico 50
.inc 50
.ini 50
.jpg 50
.js 50
left open by users, reverting 46
.lib 50
.log 50
logging access to 23, 63
matching Perforce file types to file names 49
.mpg 50
.pdf 51
.pdm 51
permanent deletion of 47
.ppt 51
subscribing to 138
verification of 48
versioned 25
.xls 51
filesystems
and performance 141
large 21
NFS-mounted, caveats 21, 142
firewall
defined 54
running Perforce through 54
fix
trigger type 125
fix status
default 106
fix triggers 125
fixes
triggers 125
flags
and Perforce Proxy 161
-f to force 52
server, listed 199
form triggers 129
form-commit
trigger type 129
forms
triggers 126
G
.gif files 50
groups
and protections 88, 93
and subgroups 93
deleting 94
editing 93
of users 93
.gz files 50
H
history of changes to forms 67
hostname
changing your server's 66
hosts
and protections 88
hosts file
on Windows and UNIX 145
.htm files 50
.html files 50
I
-i
and inetd 57
automating job submissions 110
automating user creation 44
.ico files 50
in
trigger type 128
.inc files 50
inetd 57, 200
.ini files 50
installation
Windows 16
installing
license file 19
on network drives 22
on NFS filesystems 21, 142
on UNIX 13
on Windows 16
on Windows network drives 155
Perforce Proxy 160
IP address
changing your server's 66
servers and P4PORT 56
IP forwarding
and ssh 55
J
job fields
data types 105
job specification
and administrators 101
and comments 106
default format 101
defining fields 103
extended example 108
warnings 107
job template
default 101
fields of 102
viewing 102
jobs
comments in 106
other defect tracking systems 109
triggers 125
journal
defined 28
introduced 25
managing size of 20
where to store 20
journal file
specifying 200
store on separate drive 19
journaling
disabling 30
.jpg files 50
.js files 50
L
label
namespace 67
LDAP 41, 130
.lib files 50
license 19, 45
replica server 168
limitations
Wordpad 158
list access level 89
listing
depot names 69
local depots 67
localhost 57
locking
exclusive 52
log file
specifying 200
.log files 50
logging file access 23, 63
logging in 40
login 40
M
Mac
and file formats 30
Macintosh
OS X 13
mappings
and depots 72
maxlocktime
and performance 147
maxresults
and multiple groups 149
and performance 147
use of 147
maxscanresults
and performance 147
use of 147
maxscanrows
and multiple groups 149
MD5 signatures 48
memory
and performance 141
requirements 141
metadata
see database files 25, 63
monitoring server activity 59
moving servers 63
across architectures 64
from Windows to UNIX 65
new hostname 66
new IP address 66
same architecture 64
.mpg files 50
multiple depots 66
multiserver environments 83, 167
N
naming
depots 67
network
and performance 143, 144
Perforce Proxy configuration 159
problems, diagnosing 144
network drives
and triggers 136
and Windows 22
network interface
directing server to listen to specific 56
NFS
and installation 21, 142
non-forking 191, 200
O
obliterating files 47
open access level 89
operating systems
and large filesystem support 21
OS X
and UNIX 13
out
trigger type 127
P
p4 admin
and Windows 17, 154
creating checkpoints 27, 31
stopping server with 16, 34, 35
p4 jobspec
warnings 107
p4 login 40
p4 monitor 59
p4 set -s
setting variables for Windows services 157
p4 sizes 143
p4 triggers
form 113
p4 typemap 49
p4 verify 48
P4AUDIT 200
P4AUTH 83, 197
P4Broker 189
P4CHANGE 85
p4d
flags, listed 199
security 22, 135
specifying audit log 200
specifying journal file 200
specifying log file 200
specifying port 200
specifying server root 200
specifying target server 202
specifying trace flags 191, 201
p4d.exe 17
P4DEBUG 191, 201
and proxy server 162
P4JOURNAL 200
P4LOG 200
and proxy server 161
P4P
and remote development 70
see Perforce Proxy 159, 160
P4PCACHE 160, 162
P4PFSIZE
and proxy server 161
P4POPTIONS
and proxy server 161
P4PORT
and client 15
and proxy server 161
and server 15, 200
IP addresses and your server 56
Perforce Proxy 160
P4ROOT 14, 200
and depot files 67
p4s.exe 17
P4TARGET 160, 162, 202
password aging
and tickets 40
passwords 39
setting 20, 44
PDF files
and p4 typemap 49
.pdf files 51
.pdm files 51
Perforce clients
and P4PORT 15
Perforce file types 50
Perforce Proxy 70, 159
backups 162
diskspace usage 162
installation 160
options 161
protections 163
startup 160
stopping 162
troubleshooting 163
tuning 164
Perforce server
and P4PORT 15
and triggers 117
and Windows network drives 22
installing under NFS 21, 142
monitoring 59
moving to another machine 63
running from inetd 57
upgrading 18
verifying 48
vs. service 17
Perforce service
vs. server 17
perforce.exe 16
performance
and memory 141
and scripts 149
and wildcards under Windows 144
CPU 143
monitoring 59
network 143, 159
preventing server swamp 145
slow, diagnosing 144
performance tracking 61
performance tuning
and Perforce Proxy 164
permissions
see protections 91
pessimistic locking 52
port
for client 15
for server 15
specifying 200
ports
running out of TCP/IP 143
.ppt files 51
privileges
administrator 155
protections 8795
algorithm for applying 94
and commands 95
and groups 93
and Perforce Proxy 163
and performance 147
and superusers 87
commands affected by 95
default 91
exclusionary 92
managing across servers 83
multiple 91
schemes for defining 90
securing remote depots 73
protections table 87
proxy 159
and remote development 70
python 137
R
RAM
and performance 141
read access level 89
recovery
procedures 33
remote depots 66
and service users 73
defining 72
securing 73
replica
license 168
replication 167
target server 202
resetting passwords 44
review access level 89
review daemon 137
revision range
and obliterate 48
rich text
and p4 typemap 49
root
must not run p4d 22, 135
S
save
trigger type 126
scripting
buffering standard in/output 140
guidelines for efficient 149
with -i 44
secure shell 54
security
and passwords 20
p4d must have minimal privileges 22, 135
preventing user impersonation 20
restrict remote access 73
server
and triggers 117
auditing file transfers 200
backing up 31
changing IP address 45
disk space required by 143
license file 19
licensing 19, 45, 168
migrating 63
monitoring 59
performance tracking 61
port 15
proxy 159
recovery 33
replication 167
root, specifying 191, 200, 201
running from inetd 57
running in background 200
running single-threaded 200
specifying journal file 200
specifying log file 200
specifying port 200
stopping on Windows 154
stopping with p4 admin 16, 34, 35
trace flags 61
upgrading 18
verifying 48
vs. service 17
Windows 17
server configuration
minimum client level 43
process monitoring 59
security level 41
server flags
listed 199
server root
and depots 67
and P4ROOT 14
creating 14
defined 14
specifying 200
service user 202
setting passwords 20, 44
shelve triggers 123
shelve-commit
trigger type 124
shelve-delete
trigger type 124
shelving
shelve-submit
trigger type 123
single-threaded 191, 200
spec depot
populating 68
spec depot 67
specification triggers 114, 126, 127, 128
specifications
triggers 126
ssh 54
standard input/output
buffering 140
stopping server
on Windows 154
with p4 admin 16, 34, 35
subgroups
and groups 93
super access level 39, 90
superuser
and triggers 113
force flag 52
Perforce, defining 20
superusers
and protections 87
svcinst.exe 155
symbolic links
and disk space 21
T
target server
specifying 202
TCP/IP
and port number 15
running out of ports 143
technical support
when to call 27
template
job, default 101
tickets 39
expiry 40
timeout 40
trace flags
specifying 191, 201
trigger type 120
triggers 111, 123
and Windows 136
authentication 130
content 121, 122
fields 113
firing order 134
fix 125
fix triggers 125
form 113, 129
input 128
multiple 134
naming 113
on changelists 120
on shelving 123
output 127
passing arguments to 118
portability 135
save 126
script, specifying arguments to 117
security and p4d 22, 135
shelving 124
specification triggers 126
submit 120
types of 114
warnings 127
troubleshooting
Perforce Proxy 163, 164
slow response times 144
type mapping 49
U
umask(1) 14
unicode 200
UNIX
/etc/hosts file 145
and case-sensitivity 58
upgrading
server 18
user tracking 23, 63
users
access control by groups 93
and protections 88
creating 44
deleting 45
files, limiting access to 92
nonexistent 46
preventing creation of 44
preventing impersonation of 20
resetting passwords 44
service, and remote depots 73
V
variables
in trigger scripts 118
setting for a Windows service 157
verifying server integrity 48
version information
and Perforce Proxy 162
clients and servers 19
versioned files 63
defined 25
format and location of 30
introduced 25
where stored 25
versioned specifications 67
view
scope of, and performance 146
W
warnings
and job specifications 107
archive triggers and Windows 136
disk space and Perforce Proxy 162
obliterating files 48
recursive triggers 127
replication 171
security 73
security and p4d 22, 135
wildcards
and protections 88
and Windows performance 144
Windows
and case-sensitivity 23, 59
and p4 admin 17
hosts file 145
installer 16
installing on 16
installing on network drive 22, 155
server 17
service, setting variables in 157
stopping server 154
triggers and network drives 136
Wordpad
limitation 158
write access level 89
X
.xls files 51
Z
Zeroconf 15, 200, 202


Previous Table of Contents Index Next

Perforce 2010.2: System Administrator's Guide
Copyright 1997-2011 Perforce Software.